timhudson / jwt-secretLinks
Bruteforce a JWT against a list of passwords
☆76Updated 7 years ago
Alternatives and similar repositories for jwt-secret
Users that are interested in jwt-secret are comparing it to the libraries listed below
Sorting:
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆96Updated 2 years ago
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- DNS and Target HTTP History Local Storage and Search☆64Updated 4 years ago
- Takeover AWS ips and have a working POC for Subdomain Takeover.☆91Updated 3 weeks ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆65Updated 4 years ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- ☆76Updated 4 years ago
- Send notifications on different channels such as Slack, Telegram, Discord etc.☆39Updated 2 years ago
- Dotmil subdomain discovery tool that scrapes domains from official DoD website directories and certificate transparency logs☆96Updated 4 years ago
- ☆68Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 3 years ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- A simple Swagger-ui scanner that can detect old versions vulnerable to various XSS attacks☆59Updated 5 years ago
- s3 brute force tool☆44Updated 4 years ago
- ☆44Updated 5 years ago
- Recon Custom WordList Ganerator☆58Updated 4 years ago
- Generate wordlists for fuzzing API method names☆54Updated 4 years ago
- ☆20Updated 2 years ago
- Small tool to automate SSRF wordpress and XMLRPC finder☆81Updated 2 years ago
- ☆56Updated 4 years ago
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆57Updated 3 years ago
- Go fish for AWS EIPs☆46Updated 4 years ago
- A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bul…☆100Updated 3 years ago
- Misc bounty and vulndisc things☆84Updated 4 years ago
- A tool to find subdomains or domains from passive sources.☆113Updated 4 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Updated 2 months ago